ot security

  1. CISA April 7, 2026 Warns Iran Actors Manipulate Internet-Facing PLCs in US Critical OT

    Iran-linked cyber operators are once again pushing beyond nuisance activity and into the realm of physical-process disruption, this time by targeting internet-facing programmable logic controllers across U.S. critical infrastructure. The new CISA advisory, issued on April 7, 2026, says the...
  2. Siemens SICAM 8 DoS Flaws: Patch CPCI85 RTUM85 SICORE to V26.10+

    Multiple Siemens SICAM 8 product lines are now caught up in another round of industrial-control security disclosures, this time involving two denial-of-service flaws that affect the CPCI85, RTUM85, and SICORE components used across Siemens’ power-automation portfolio. Siemens says fixes are...
  3. WAGO Managed Switch CLI Escape Flaw CVE-2026-3587: Patch and Disable SSH/Telnet

    WAGO’s industrial managed switches are facing a serious security problem that reads like a classic OT nightmare: an unauthenticated remote attacker may be able to abuse a hidden function in the CLI prompt, break out of the restricted interface, and potentially gain full device compromise. The...
  4. Siemens SIAPP SDK Flaws Prompt Patch to V2.1.7 and OT Hardening

    Siemens has published a focused security advisory for the SICAM SIAPP SDK that warns of multiple memory‑safety and input‑validation flaws in SDK releases before V2.1.7 and urges immediate updates and hardening by anyone building or running SIAPPs. The defects — which Siemens characterizes as an...
  5. Critical Lantronix EDS Devices Exposed: Root Access CVEs and 9.8 CVSS

    A set of severe, high‑impact vulnerabilities in Lantronix’s EDS family of serial‑to‑Ethernet device servers — specifically the EDS3000PS and EDS5000 models — has put industrial and enterprise edge networks at risk of unauthenticated root‑level compromise. The U.S. Cybersecurity and...
  6. OT DoS Alert: MELSEC iQ‑F FX5 ENET/IP and FX5 EIP UDP Flood Flaws

    Mitsubishi Electric has disclosed a cluster of high‑impact denial‑of‑service vulnerabilities affecting the MELSEC iQ‑F Series EtherNet/IP and Ethernet modules that, if left unmitigated, can be weaponized by a remote attacker to render communications unavailable and force a device reset — with...
  7. RTU500 Security Advisories: Mitigating CVEs in Substation OT

    Hitachi Energy's RTU500 family is the subject of a fresh set of security advisories that enumerate multiple firmware-level flaws capable of leaking low-value user management data and causing device outages — vulnerabilities operators must treat as urgent because the affected components sit at...
  8. Nexcom Unveils Fanless Panel PCs and Jetson Robot Controller at Embedded World 2026

    Nexcom’s latest Embedded World showcase is a clear signal that industrial PC vendors are doubling down on fanless reliability, local AI capability, and ruggedized edge platforms — the company has unveiled the APPC C21‑01 fanless panel PC family for factory HMIs, a Jetson‑powered robotics...
  9. Frick Quantum HD CVEs Drive Pre-Auth RCE Risk in Industrial Refrigeration

    Johnson Controls’ Frick Controls Quantum HD family has been pushed into the center of a new industrial‑control security storm after a coordinated advisory flagged a cluster of high‑severity remote vulnerabilities that — if chained or exploited at scale — could let unauthenticated attackers run...
  10. Yokogawa CENTUM VP Vnet/IP Flaws: Patch R1.08.00 to Mitigate DoS CVEs

    Yokogawa's CENTUM VP family has a new cluster of vulnerabilities that demand urgent attention from OT teams: the vendor has confirmed multiple memory‑safety and packet‑handling flaws in the Vnet/IP Interface Package used with CENTUM VP R6 and R7, and has released a corrective patch (R1.08.00)...
  11. Urgent Patch for Schneider Electric EBO: XXE CVE-2026-1227 and Code Injection CVE-2026-1226

    Schneider Electric has published an urgent security notice for EcoStruxure Building Operation (EBO) after researchers disclosed two high‑impact vulnerabilities—CVE‑2026‑1226 and CVE‑2026‑1227—that can be triggered by crafted TGML graphics files and may allow local file disclosure...
  12. From Pilots to Production: AI and Unified IT OT Data for Grid Modernization

    Microsoft’s DTECH 2026 messaging is blunt: the utility sector is past the era of proof‑of‑concepts and into a phase where AI, unified IT/OT data, and partner-driven architectures must deliver repeatable operational outcomes — not pilots. Across the show floor and Microsoft‑led sessions, the...
  13. Siemens SINEC OS Pre 3.3 Vulnerabilities: Urgent Patch Guidance for OT RUGGEDCOM and SCALANCE

    Siemens has confirmed that multiple products running SINEC OS versions earlier than 3.3 include third‑party components with dozens of security flaws — a broad, high‑impact update that requires immediate attention from operators of RUGGEDCOM and SCALANCE devices, and from any team responsible for...
  14. Why Johnny Can't Authenticate: Practical OT Security Guidance by CISA

    CISA’s new guidance, "Barriers to Secure OT Communication: Why Johnny Can’t Authenticate," bluntly reframes a long-standing truth for industrial operators: the cryptographic and authentication features necessary to stop simple, high-impact attacks exist in many pockets, yet they are rarely...
  15. Dragos Microsoft OT Security Integration: Azure SaaS and Sentinel

    Dragos’s expanded collaboration with Microsoft marks a decisive step in bringing purpose-built operational technology (OT) security into mainstream enterprise cloud and security operations: the Dragos Platform will run on Microsoft Azure, feed OT telemetry and asset context into Microsoft...
  16. Dragos and Microsoft Unite OT Security on Azure and Sentinel

    Dragos’s expanded collaboration with Microsoft marks a significant step toward bringing purpose-built operational technology (OT) security into mainstream enterprise cloud and security operations: the Dragos Platform will run on Microsoft Azure, push OT-specific telemetry and asset context into...
  17. CVE-2026-1633: Unauthenticated Attack on Synectix LAN 232 TRIO Serial Gateway

    A remotely exploitable, high‑severity vulnerability in the Synectix LAN 232 TRIO serial‑to‑Ethernet adapter (CVE‑2026‑1633) leaves the device’s web management interface completely unprotected, allowing unauthenticated attackers to change critical configuration, erase device state, or...
  18. Urgent Metasys CVE-2025-26385 Patch: Mitigating Command Injection in Johnson Controls Systems

    A critical, high‑impact vulnerability in Johnson Controls’ Metasys product line — tracked as CVE‑2025‑26385 in vendor advisories — demands immediate attention from building‑automation teams, Windows administrators, and any organization that uses Metasys ADS/ADX servers, LCS/NAE appliances or the...
  19. CVE-2025-26386 Patch ICU to 6.9.8 on Windows Hosts

    Johnson Controls’ iSTAR Configuration Utility (ICU) tool has a newly disclosed vulnerability — a stack‑based buffer overflow assigned CVE‑2025‑26386 — that can crash the Windows host running the utility and, in certain conditions, enable more severe host‑impact outcomes if exploited. The...
  20. OT Secrets Exposed in Verve Asset Manager: Patch to 1.42 Now

    Two newly disclosed vulnerabilities in Rockwell Automation’s Verve Asset Manager expose plaintext secrets in retired, optional components — a wake-up call for OT teams that still run legacy modules and for Windows‑centric engineering workstations that serve as gateways into industrial networks...